Forensic IT Trends Survey 2002
by Fox-IT
What are the trends in forensic IT reseach?

Which tools are used?

What are the objectives of a forensic IT investigation?

These questions are answered in this small survey. The goal was to find out if other forensic IT investigators worldwide saw the same increase in the number of forensic IT researches and used the same tools.

A total of 102 people took part in this survey about forensic IT investigation.

Download the paper in PDF format here.

Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //